The bad actors have been hackers, cyber criminals, and nation states that engage in cyber espionage.
FORBES: Operation Olympic Games, Project X, and the assault on the IT security industry
The range of tools used by cyber criminals reveals the quick evolution of the industry.
Scam emails and infected websites still represent a major source of income for cyber criminals.
Unfortunately, cyber criminals are having a field day with all these new opportunities to penetrate our information.
FORBES: Dear Mobile Industry: Time To Step It Up On Security
Cyber cyber criminals began trying to capture confidential records from computers within minutes of his announced demise.
FORBES: Scammers Roil The Internet In Wake Of Bin Laden's Death
The cyber criminals dramatically increased the available balances for those cards and eliminated withdrawal limits on the cards, prosecutors said.
Thanks to the growing popularity of smartphones, more and more people are having their online identities stolen from cyber criminals.
The other flaw enables cyber criminals to suppress permission prompts and install malware to gain full control over the handset.
FORBES: Google Faces Serious Risk To Stock Price From Android Security Woes
It was becoming clear, he said, that some attacks were aided by the 30, 000 machines under the cyber criminals control.
"I'm not saying (cyber criminals) are involved in physical violence, but it's not out of the realm of possibility, " he said.
Security experts have been advising people to disable Java for some time, since it is so commonly targeted by cyber criminals.
FORBES: US Department of Homeland Security Calls On Computer Users To Disable Java
Java vulnerabilities continue to be a favorite of cyber criminals, Namestnikov said, because Java exploits are easy to use under any Windows.
FORBES: Apple's iTunes, QuickTime, High On Cyber Security Vulnerability List, Kasperky Lab Says
Unfortunately, cyber criminals, hackers, and corporate spies can also access those tools.
"Once it became a business, then (cyber criminals) began to look at what companies like us were doing, and figure out weaknesses, " he said.
When people visit the fake site and enter their login details these are recorded by cyber criminals who may loot the account soon afterwards.
So, here is the bottom line for corporate America: unlike traditional crimes, companies cannot just call the cops and let them chase the cyber criminals.
FORBES: Mandiant Report on Chinese Hackers is Not News But Its Approach Is
Cyber attacks against websites have become high profile in recent months and Mr Adiba is under no illusions about how attractive the Games will be to cyber criminals.
One look at a chart showing the number of attacks on mobile devices last year and it is clear, the cyber criminals all have Android in their crosshairs.
FORBES: Worm Attacks Coming For Google's Android - Kaspersky Lab
Still, there was also acknowledgment that hackers reach new levels of sophistication with each new virus that is written, creating, in Cerf's words, a "cottage industry" of cyber criminals.
They engage in active research on new threat actors, new methodologies, and new vulnerabilities exposed by the types of targets that are being selected by cyber criminals and state actors.
FORBES: In Cyber, Losers Ignore, Survivors React, and Winners Predict
Hackers have been after passwords, bank account data and other personal information used for identity theft or years, but now cyber criminals appear to have a new target: airline miles.
But the strategy also urges police, prosecutors and the courts to use existing powers to restrict and monitor computer use by convicted cyber criminals, who are considered likely to strike again online.
"The fundamental fact is cyber criminals are highly organized with sophisticated corporate structures and business chains, " said Michael Fraser, director of the Communications Law Centre at the University of Technology Sydney in Australia.
This would ensure that popular vectors, developed by cyber criminals to attack and control the target rich consumer space would not also lead to infections of SCADA controllers, transaction processors, or real time environments.
In some cases, these markets are run under the auspices of legitimate security firms, but in others they are open to cyber criminals and intelligence professionals who could use the vulnerability to steal information.
The good news: while cyber criminals are rolling out the red carpet for the 84th Annual Academy Awards, you can keep your bank account from rolling in the red by not falling for their troublesome tricks.
FORBES: Oscar Night Could Be An Award-Winner For Computer Viruses
Brian Moore, senior lecturer in ethical hacking and network security at Coventry University, said the general perception of how cyber criminals operated had been "glamourised and completely falsified by the likes of shows like CSI and NCIS".
应用推荐